Which of the following threats uses personalized information in an attempt at obtaining information?
A) Whaling
B) Impersonation
C) Spoofing
D) Spear phishing
Correct Answer:
Verified
Q198: A new policy requires all users to
Q199: A user's phone contains customer's PII. The
Q200: A technician is working at a help-desk
Q201: A user contacts a technician to troubleshoot
Q202: A user calls the help desk regarding
Q204: Ann, a user, is attempting to log
Q205: A junior Linux system administrator needs to
Q206: Which of the following installation types would
Q207: Which of the following steps should a
Q208: A SOHO technician recently moved some data
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents